29
Security Infrastructure Specialist Model Curriculum Security Infrastructure Specialist SECTOR: SUB-SECTOR: OCCUPATION: REF ID: NSQF LEVEL: IT-ITeS IT SERVICES INFORMATION/CYBER SECURITY SSC/Q0923, V1.0 8

Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

  • Upload
    others

  • View
    16

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist

Model Curriculum

Security Infrastructure Specialist

SECTOR: SUB-SECTOR: OCCUPATION:

REF ID: NSQF LEVEL:

IT-ITeS IT SERVICES INFORMATION/CYBER SECURITY SSC/Q0923, V1.0

8

Page 2: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist

Page 3: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist

TABLE OF CONTENTS

1. Curriculum 01

2. Trainer Prerequisites 13

3. Assessment Criteria 14

Page 4: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 1

Security Infrastructure Specialist

CURRICULUM / SYLLABUS

This program is aimed at training candidates for the job of a “Security Infrastructure Specialist”, in the

“IT-Services” Sector/Industry and aims at building the following key competencies amongst the

learner

Program Name Security Infrastructure Specialist

Qualification Pack Name & Reference ID. ID

SSC/Q0923 Version 1.0

Version No. 1.0 Version Update Date 04/1/2018

Pre-requisites to Training

Graduate in Security/Computer Science/Electronics and Engineering /IT

Training Outcomes After completing this programme, participants will be able to:

Configure cyber security infrastructure components

Maintain and enhance cyber security infrastructure components

Define the cyber security infrastructure policy or technical security policy for an organization

Monitor and report on performance of operational and technical cyber security measures

Drive interrelated cyber security actions

Managing a project team

Manage your work to meet requirements

Work effectively with colleagues

Maintain a healthy, safe and secure working environment

Provide data/information in standard formats

Develop your knowledge, skills and competence

Page 5: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 2

This course encompasses 11 out of 11 National Occupational Standards (NOS) of “Security

Infrastructure Specialist” Qualification Pack issued by “IT-ITeS SSC”.

Sr. No. Module Key Learning Outcomes Equipment Required

1 IT-ITES/BPM Industry – An Introduction Theory Duration (hh:mm) 06:00 Practical Duration (hh:mm) 01:00 Corresponding NOS Code Bridge Module

Establish the nature and scope of IT-ITeS/BPM Industry with their sub-sectors.

Collate information, evidence, and artifacts regarding the IT-ITeS/BPM industry.

Define various occupations in the It-ITes industry.

Identify the processes involved in maintaining and managing the IT-ITeS/BPM industry with their sub-sectors.

State the profile of IT services in the IT sub-sector.

Review the scope of the industry with appropriate people and incorporate their inputs.

Whiteboard and Markers.

LCD Projector and Laptop for presentations.

Lab equipped with the following: -

PCs/Laptops

Internet with WiFi (Min 2 Mbps Dedicated)

Networking Equipment

Routers & Switches

Chart paper and sketch pens.

2 IT Services – An Introduction Theory Duration (hh:mm) 03:00 Practical Duration (hh:mm) 01:00 Corresponding NOS Code

Bridge Module

Establish the nature and scope of IT services in the IT-ITeS/BPM industry.

Identify the various categories of services and sub-sectors under the IT industry along with their scope.

Liaise with appropriate people to gather data/information required for maintaining IT services in an organization.

Organize data/information required for maintaining and managing IT services along with their sub-sectors services.

Provide Immediate support to appropriate people for maintaining IT services in an organization.

Whiteboard and Markers.

LCD Projector and Laptop for presentations.

Lab equipped with the following:

PCs/Laptops

Internet with WiFi (Min 2 Mbps Dedicated).

Page 6: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 3

Participate in discussions/ review meetings, as required.

3. Information/Cyber Security – An Introduction Theory Duration (hh:mm) 05:00 Practical Duration (hh:mm) 04:00 Corresponding NOS Code Bridge Module

Establish their role and responsibilities in contributing to managing information security

State the importance of cyber security along with their social impact.

Define the work responsibilities of the security infrastructure specialist.

Provide immediate support to staff for maintaining security regulations in organizations.

List the key responsibilities of a security infrastructure specialist.

Define career opportunities in the cyber security field.

Whiteboard and Markers.

Chart paper and sketch pens.

Lab equipped with the following:

PCs/Laptops

Internet with Wi-Fi (Min 2 Mbps Dedicated).

4. Fundamentals of IT Security Infrastructure Theory Duration (hh:mm) 08:00 Practical Duration (hh:mm) 25:00 Corresponding NOS Code SSC/N0937

Establish the scope of work and limitations of the Security Infrastructure Specialist for an organization.

Analyze the security posture of an organization and suggest some solution to make it robust.

Update their organization’s knowledge base promptly and accurately with information security issues and their resolution.

Explain the key components of the IT security infrastructure.

Compare and analyze different types of security protocols as per their features and functionalities.

Whiteboard and Markers.

LCD Projector and Laptop for presentations.

Lab with key devices, software, and hardware in a large network.

Should include but not be limited to- application of multiple networking topology; use of various Network Protocols; bandwidth management tools; background of IT assets; hubs; switches; routers; servers; access points; media access controls; transmission media IDS/IPS; application of SSL, VPN, 2FA, Encryption, etc.

Page 7: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 4

5. Fundamentals of Security Infrastructure Components Theory Duration (hh:mm) 08:00

Practical Duration (hh:mm) 26:00 Corresponding NOS Code SSC/N0938

Establish the scope of protection mechanism applied for securing an organization’s infrastructure.

List all the existing security protocols and in line them with security infrastructure of an organization.

Classify and prioritize the functionalities of existing anti-virus & anti-malware.

Access the organization’s knowledge base for information on previous security incidents and how they were managed

Liaise with stakeholders to gather, validate and provide information related to information security incidents, where required.

Comply with the existing network infrastructure components and recommend solution in accordance with the organization policies.

Whiteboard and markers.

LCD projector and laptop for presentations.

Access to various samples of applications and components of each category including various types of networking components for implementing perimeter security.

Provision for online research in the lab for all students.

At least two subject matter experts from the industry in the field of Infrastructure security.

Page 8: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 5

6. Security Mechanisms Theory Duration (hh:mm) 10:00 Practical Duration (hh:mm) 28:00 Corresponding

NOS Code SSC/N0938

Establish a clearly defined scope and limitation for various security tools used.

List all the IT infrastructure that must be investigated for ensuring an organization’s security.

Investigate the data leak and apply proper prevention techniques.

Coordinate with other people to gather information regarding security enhancement procedures.

Test the current status of Anti-virus and anti-malware installed.

Go through the working mechanism of the proxy server and analyze how data will be altered.

Update their organization’s knowledge base with the documents.

Install a firewall for applying different filtering techniques and enhancing security.

Apply filtering rule for blocking unauthorized USB usage.

Install the open source Calm Win for better security of systems against viruses/ trojans and all available virus signature.

Whiteboard and markers.

LCD projector and laptop for presentations.

Provision for online research in the lab for all students.

Provision of online research for various security mechanism require to implement infrastructure security.

Samples of secure components.

Open source code scanning tools and their tutorials.

Hardware requirements

4 GB System memory.

100 GB of free hard disk drive space.

2 GHz Core i3 processor or better.

Local Network connectivity is necessary.

Internet access connectivity is necessary for the installer media.

A DVD Drive or USB port is required for the installer media.

Software requirements:

Operating system Win 7, 10 (32, 64 Bit) setup.

Supported software.Net, SQL Server.

Supported Browser IE v10, Google Chrome v54 or better.

VMware Workstation.

Endian Firewall.

7. Evaluating Organizational Security Posture using various Strategies Theory Duration (hh:mm) 8:00 Practical Duration (hh:mm) 28:00 Corresponding

NOS Code

Establish the clearly defined scope of the existing security solutions for an organization.

Evaluate the gap between the existing and recommended security solutions for an organization.

Compare and contrast the basic differences and techniques between Internal and external audit.

Perform Internal audit to find anomalies in the processes and suggest a solution to rectify the same.

Perform an external audit to verify the security

Whiteboard and markers.

LCD projector and laptop for presentations.

Provision for online research in the lab for all students.

Provision for online research for all participants regarding audit drivers, regulations, policies, and customer requirements.

Page 9: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 6

SSC/N0939 methodologies applied in an organization, when required.

Seek guidance and recommendation from others in the organization, when required.

Comply with their organization’s policies, procedures, and guidelines while performing auditing in an organization.

8. Vulnerability Assessment and Penetration Testing Theory Duration (hh:mm) 10:00 Practical Duration (hh:mm) 32:00 Corresponding

NOS Code SSC/N0939

Establish their role and responsibilities in contribution to performing a vulnerability assessment.

Perform a gap assessment between the existing and recommended security solutions.

Establish an understanding of an organization’s network environment.

Define the difference between vulnerability assessment and penetration testing.

Carry out Vulnerability assessment of security systems using automated tools.

Maintain accurate daily records/logs of VAPT analysis using standard templates and tools

Provide inputs for threat modeling and the resolution of security issues, where required.

Review the security posture and coordinate with other people when necessary.

Update their organization’s knowledge base promptly and accurately with security issues and their resolution.

Whiteboard and markers.

LCD projector and laptop for presentations.

Provision for online research in the lab for all students.

Access to free OWASP tools and methods and their tutorials for VAPT steps, classifications, and phases.

Page 10: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 7

9. Fundamentals of Cyber Security Measures Theory Duration (hh:mm) 08:00 Practical Duration (hh:mm) 26:00 Corresponding

NOS Code SSC/N0933

Establish their role and responsibilities in contributing to managing cyber security.

Develop risk management methodologies for providing mitigation techniques.

State the relevance of patch management with respect to the existing security software.

Monitor systems and apply controls in line with cyber security policies, procedures, and guidelines.

Carry out a security assessment of systems using automated tools.

Install and configure security software as per the organizational policies.

State the importance of configuration management.

Develop processes for threat and vulnerability management.

Whiteboard and markers.

LCD projector and laptop for

presentations.

Provision for online research

in a lab for all students.

Access to online research

facility regarding risk

assessment, patch

management, etc.

10. Vulnerability Management and Legal Compliance Theory Duration (hh:mm) 10:00 Practical Duration (hh:mm) 28:00 Corresponding NOS Code SSC/N0933

Perform Vulnerability assessment for vulnerability management.

Prepare accurate preliminary reports on VAPT analysis using standard process and procedures.

Submit preliminary reports promptly to appropriate people for action.

Develop the processes for incident response management and prioritize them accordingly.

Maintain accurate daily

records/logs of cyber security

performance parameters using

standard templates and tools.

Investigate the log summary for any issues and anomalies in the log data.

Prepare a methodology for log monitoring processes.

Perform the system integrity check in accordance with organizational policies.

Comply with the organization’s policy, regulations, and guidelines while performing security analysis on the organizational assets.

Whiteboard and markers.

LCD projector and laptop for presentations.

Lab with provision for online research.

Access to an online research facility for incident response, event, and log monitoring, etc.

Page 11: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 8

11. Introduction to Mitigation Techniques

Theory Duration (hh:mm) 08:00

Practical Duration (hh:mm) 28:00

Corresponding NOS Code SSC/N0927

Analyze the results obtained from the VAPT analysis and document the findings accordingly.

List and define the scope of remediation techniques suggested in the report.

List and define the dependencies of the entire system to achieve objectives and processing the resolving techniques.

Recommend various remediation techniques based on the assessment report and prioritize them accordingly.

Investigate systems to verify

existing vulnerabilities.

Apply various techniques for

device hardening.

Develop a checklist

documenting minimum

baseline security standards for

ensuring security.

State the importance of

governance, risk, and

compliance in an organization.

Coordinate with appropriate

people where managing

regulations are beyond their

levels of knowledge, skills, and

competence.

Whiteboard and markers.

LCD projector and laptops for making presentations.

Provision for online research in a lab for all students.

Undertake research on various mitigation techniques against vulnerabilities found as well as for training and awareness.

12. Security Foundations

Theory Duration (hh:mm) 08:00 Practical Duration (hh:mm) 26:00 Corresponding NOS Code

SSC/N0927

Organize awareness training for staff and employees.

Prepare awareness document effectively for easy understanding.

Establish an individual’s scope of work in accordance with their roles and responsibilities.

Monitor systems and apply controls in line with information security policies, procedures, and guidelines.

Carry out a security assessment of systems using automated tools

Apply various security methodologies for securing an organization’s systems and network.

Whiteboard and markers.

Provision for online research in the lab.

LCD projector and laptops for making presentations.

Provision for online research in a lab for all students.

Provision for accessing various tools helping for device hardening, system security, etc.

Page 12: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 9

Prepare methodologies to ensure regular backups of security systems.

Seek recommendation on security issues from appropriate people, where required.

Prepare a checklist processes execution in compliance with the organization policies.

13. Project Team Management Theory Duration (hh:mm) 08:00

Practical Duration (hh:mm) 22:00 Corresponding NOS Code SSC/N0928

Communicate with the team clearly, concisely and accurately.

Explain the importance of team management to team members

Contribute effectively with team members to work within the project timeline.

Manage a project team for the timely delivery of the project.

Work with team to integrate their work effectively with them.

Pass on essential information to the team in line with organizational requirements.

Carry out commitments that have made to the team

Identify any problems they have working with the team and take the initiative to solve these problems

Follow the organization’s policies and procedures for working with the team.

Whiteboard and markers.

Lab with online research facilities of project team management skills.

14. Manage your work to meet requirements Theory Duration (hh:mm) 20:00 Practical Duration (hh:mm) 25:00

Establish and agree with your work requirements with appropriate people.

Keep your immediate work area clean and tidy.

Utilize your time effectively.

Treat confidential information correctly

Work in line with your organization’s policies and procedures.

Whiteboard and Markers.

LCD Projector and Laptop for presentations.

Training organization’s confidentiality policy.

Page 13: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 10

Corresponding

NOS Code SSC/N9001

Work within the limits of your job role.

Obtain guidance from appropriate people, where necessary.

Ensure your work meets the agreed requirements.

15. Work effectively with colleagues Theory Duration (hh:mm) 20:00 Practical Duration (hh:mm) 25:00 Corresponding

NOS Code SSC/N9002

Communicate with colleagues clearly, concisely and accurately.

Work with colleagues to integrate your work effectively with theirs.

Pass on essential information to colleagues in line with organizational requirements.

Work in ways that show respect for colleagues.

Carry out the commitments you have made to colleagues.

Let colleagues know in good time if you cannot carry out your commitments, explaining the reasons.

Identify any problems you have working with colleagues and take the initiative to solve these problems.

Follow the organization’s policies and procedures for working with colleagues.

Whiteboard and Markers.

LCD Projector and Laptop for presentations.

Provision to write emails and send in the lab.

Lab with provision for internet, email, word processor and presentation software.

Chart paper, markers, picture magazines, and old newspapers.

16. Maintain a healthy, safe and secure working environment Theory Duration (hh:mm) 20:00 Practical Duration (hh:mm) 25:00 Corresponding

NOS Code SSC/N9003

Comply with your organization’s current health, safety and security policies and procedures.

Report any identified breaches in health, safety, and security policies and procedures to the designated person.

Identify and correct any hazards that you can deal with safely, competently and within the limits of your authority.

Report any hazards that you are not competent to deal with to the relevant person in line with organizational procedures and warn other people who may be affected.

Follow your organization’s emergency procedures promptly, calmly, and efficiently.

Whiteboard and Markers.

LCD Projector and Laptop for presentations.

The training organization’s current health, safety, and security policies and procedures.

Provision for online research in the Lab.

A sample health and safety policy document.

Emergency broadcast system and mock emergency signage in the appropriate areas of the training institute.

Page 14: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 11

Identify and recommend opportunities for improving health, safety, and security to the designated person.

Complete any health and safety records legibly and accurately.

17 Provide data/information in standard formats Theory Duration (hh:mm) 20:00 Practical Duration (hh:mm) 25:00 Corresponding

NOS Code SSC/N9004

Establish and agree with appropriate people the data/information you need to provide, the formats in which you need to provide it, and when you need to provide it.

Obtain the data/information from reliable sources.

Check that the data/information is accurate, complete and up-to-date.

Obtain advice or guidance from appropriate people where there are problems with the data/information.

Carry out rule-based analysis of the data/information, if required.

Insert the data/information into the agreed formats.

Check the accuracy of your work, involving colleagues where required.

Report any unresolved anomalies in the data/information to appropriate people.

Provide complete, accurate and up-to-date data/information to the appropriate people in the required formats on time.

Whiteboard and Markers.

LCD Projector and Laptop for presentations.

Provision for online research in the lab.

18 Develop knowledge, skills and competence

Obtain advice and guidance from appropriate people to develop your knowledge, skills, and competence.

Whiteboard and Markers.

LCD Projector and Laptop for presentations.

Soft copy of QP-NOS.

Page 15: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 12

Theory Duration (hh:mm) 20:00 Practical Duration (hh:mm) 25:00

Corresponding NOS Code

SSC/N9005

Identify accurately the knowledge and skills you need for your job role.

Identify accurately your current level of knowledge, skills and competence and any learning and development needs.

Agree with appropriate people a plan of learning and development activities to address your learning needs.

Undertake learning and development activities in line with your plan.

Apply your new knowledge and skills in the workplace, under supervision.

Obtain feedback from appropriate people on your knowledge and skills and how effectively you apply them.

Review your knowledge, skills, and competence regularly and take appropriate action.

Provision for online access to all students in the lab.

Questionnaire and key for Honey and Mumford learning styles.

Total Duration:

Theory Duration

200:00

Practical Duration

400:00

Unique Equipment Required:

Whiteboard and Markers, LCD Projector and Laptop for presentations, Chart paper

Lab equipped with the following: PCs/Laptops and Internet with WiFi (Min 2 Mbps Dedicated), provision for email, word processor and presentation software. CRM application, such as Siebel, Zoho, Social networking tool / LMS tool to enable blog posts or discussion board, Instant messenger, chat and email tools to enable mock exercises

A sample health and safety policy document, Emergency broadcast system and mock emergency signage in the appropriate areas of the training institute

Grand Total Course Duration: 600 Hours, 0 Minutes

(This syllabus/ curriculum has been approved by SSC: IT-ITeS Sector Skills Council NASSCOM)

Page 16: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 13

Trainer Prerequisites for Job role: “Security Infrastructure Specialist” mapped to Qualification Pack: “SSC/Q0923,V1.0”

Sr. No. Area Details

1 Description To deliver accredited training service, mapping to the curriculum detailed above, in accordance with the Qualification Pack “SSC/Q0923,V1.0”.

2 Personal Attributes

Aptitude for conducting training, and pre/ post work to ensure competent, Employable candidates at the end of the training. Strong communication skills, interpersonal skills, ability to work as part of a team; a passion for quality and for developing others; well-organized and focused, eager to learn and keep oneself updated with the latest in this field.

3 Minimum Educational Qualifications

Graduate in Security/ Computer Science/Electronics and Engineering /IT

4a Domain Certification

Certified for job role “Security Infrastructure Specialist” mapped to Qualification Pack “SSC/Q0923,V1.0” Minimum accepted score is 80%

4b Platform Certification

Recommended that the trainer is certified for the Job role “Trainer” mapped to the Qualification Pack “MEP/Q0102”. Minimum accepted score is 80% aggregate

5 Experience 2-5 years of work experience/internship in information technology.

Page 17: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 14

Assessment Criteria

Job Role Security Infrastructure Specialist

Qualification Pack SSC/Q0923,V1.0

Sector Skill Council IT-ITeS

Sr. No.

Guidelines for Assessment

1 Criteria for assessment for each Qualification Pack (QP) will be created by the Sector Skill Council (SSC). Each performance criteria (PC) will be assigned Theory and Skill/Practical marks proportional to its importance in NOS.

2 The assessment will be conducted online through assessment providers authorized by SSC.

3 Format of questions will include a variety of styles suitable to the PC being tested such as multiple-choice questions, fill in the blanks, situational judgment test, simulation and programming test.

4 To pass a QP, a trainee should pass each individual NOS. Standard passing criteria for each NOS is 70%

5 For the latest details on the assessment criteria, please visit www.sscnasscom.com.

6 In case of successfully passing only certain number of NOS's, the trainee is eligible to take subsequent assessment on the balance NOS's to pass the Qualification Pack.

Page 18: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 15

Assessment

Outcomes Assessment Criteria for Outcomes

Total

Marks (1100)

Out of

Marks Allocated

Theory Skills

Practical

1. SSC/N0937 (Configure cyber security infrastructure components)

PC1. Follow the security policy document that includes organization’s inventory assessment and network diagrams and maps.

100

4 2 2

PC2. Conduct an inventory to identify the approved security infrastructure including hardware and software to be protected.

4 1 3

PC3. Identify hardware, software and network resources deployed throughout the organization’s campus.

3 1 2

PC4. Identify cyber security infrastructure components and categorize them.

3 1 2

PC5. Identify sensitive data and transaction flows.

3 1 2

PC6. Scan organization’s Internet address ranges. 4 2 2

PC7. Have the network tested to ascertain that it has not been breached nor infected with viruses before the firewall is deployed.

3 1 2

PC8. Use a dynamic network topology application to map infrastructure initially and to update the map automatically on adding machines and entering the data.

4 1 3

PC9. Replace obsolete versions of network device firmware.

4 1 3

PC10. Shut down unused physical interfaces on network infrastructure. 3 1 2

PC11. Establish secure values or parameters that describe particular automated functions of various infrastructure components.

4 2 2

PC12. Establish the location where a component physically and logically resides (e.g., behind a firewall, within a DMZ, on a specific subnet, etc.).

3 1 2

PC13. Implement safeguards through software to protect end-user machines against attack.

4 1 3

PC14. Protect the network device configuration file from unauthorized disclosure.

3 1 2

Page 19: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 16

PC15. Prioritize configurations using appropriate criteria. 4 2 2

PC16. Test the configurations and the secure values or parameters in virtual environment and resolve issues and document deviations identified during testing.

3 1 2

PC17. Record and approve the baseline configuration in accordance with an organizationally defined policy.

3 1 2

PC18. Implement baseline configurations in a centralized and automated manner using automated configuration management tools, automated scripts, vendor-provided mechanisms, etc.

3 1 2

PC19. Implement access lists that allow only those protocols, ports and IP addresses that are required as per policy.

3 1 2

PC20. Encode and encrypt and/or a salted hash with iteration to protect the confidentiality of passwords in configuration files.

4 2 2

PC21. Improve firewall and network performance by examining large or complicated rulesets and identifying redundant and unused rules.

3 1 2

PC22. Simplify firewall rulesets for more accurate analysis and faster troubleshooting.

4 1 3

PC23. Select traffic filtering technology and define traffic-filtering rules that will determine the manner in which the incoming and outgoing traffic flows in the network will be regulated.

3 1 2

PC24. Implement defined rules on the selected technology and optimize the performance of infrastructure accordingly.

3 1 2

PC25. Update all the components of the solution, including not only infrastructure but also the policy.

3 1 2

PC26. Update firewall IP address, subnet masks, the default username and passwords of the firewall infrastructure.

3 1 2

PC27. Apply vendor-released patches in response to identified vulnerabilities, including software update.

3 1 2

Page 20: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 17

PC28.Maintain and update technical specification and design documentation, system security documentation, system procedures, etc.

3 1 2

PC29. Store, protect, and control the master copies of approved versions of baseline configurations using various media.

3 1 2

PC30. Provide technical refresh recommendation based on infrastructure policy.

3 1 2

Total 100 35 65

2. SSC/N0938

(Maintain and enhance cyber security infrastructure components)

PC1. Check server availability, functionality, integrity, and efficiency.

100

4 1 3

PC2. Maintain baseline system security according to organizational policies. 3 1 2

PC3. Conduct functional and connectivity testing to ensure continuing operability.

3 1 2

PC4. Conduct periodic server maintenance including cleaning (both physically and electronically), disk checks, routine reboots, data dumps, and testing.

5 1 4

PC5. Follow group policies and access control lists to ensure compatibility with organizational standards, business rules, and needs.

4 1 3

PC6. Update existing signatures of firewall devices and routers.

3 1 2

PC7. Analyze TCP traffic and update atomic signatures to reduce resource consumption.

4 1 3

PC8. Install server updates and enhancements.

5 1 4

PC9. Implement new system design procedures, test procedures, and quality standards.

4 1 3

PC10. Repair network connectivity problems.

4 1 3

PC11. Perform repairs and upgradations on faulty server hardware.

6 2 4

PC12. Plan and coordinate the installation of new or modified hardware, operating systems, and another baseline software.

4 1 3

Page 21: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 18

PC13. Provide ongoing optimization and problem-solving support. 4 1 3

PC14. Follow configuration change control process in case and change of configuration is required during maintenance or troubleshooting.

3 1 2

PC15. Resolve hardware/software interface and interoperability problems. 4 1 3

PC16. Identify and shut down unneeded services on network devices. 5 2 3

PC17. Provision all the services and information security elements and devices.

4 1 3

PC18. Use tools to scan and detect the missing security patches and trigger the patch management process.

5 2 3

PC19. Download the testing patch and fix ineffective security measures already in place.

5 1 4

PC20. Monitor and maintain server configuration. 5 2 3

PC21. Maintain network infrastructure device operating system software (e.g., Internetwork Operating System [IOS], firmware).

4 1 3

PC22. Integrate new systems into the existing network architecture. 5 2 3

PC23. Patch network vulnerabilities to ensure information is safeguarded against outside parties.

4 2 2

PC24. Perform tracking of OEMs. 3 1 2

Total 100 30 70

3. SSC/N0939

(Define the cyber security infrastructure policy or technical security policy for an organization)

PC1. Confirm if complete and accurate details are available for understanding the security objectives.

100

4 1 3

PC2. Review the usage of existing cyber security infrastructure and assess risks w.r.t security objectives.

3 1 2

PC3. Consult with engineering teams in various cyber security functions for their evaluation and recommendation regarding existing security infrastructure.

3 1 2

PC4. Create a map of the security counter measures at different layers: network security, access control mechanisms, endpoint security,

3 1 2

Page 22: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 19

application security, databases and unstructured data.

PC5. Identify the level of risk acceptable for business requirements by discussing with business and technical leads.

4 2 2

PC6. Identify and prioritize critical business functions in collaboration with organizational stakeholders.

3 1 2

PC7. Evaluate the positioning of the security countermeasures w.r.t to cyber security infrastructure.

3 1 2

PC8. Evaluate the security posture of an organization by various means. 3 1 2

PC9. Evaluate the capability of the cyber security infrastructure to address all possible security threats.

3 2 1

PC10. Evaluate the process for development of cyber security infrastructure architecture from various operational perspectives.

3 1 2

PC11. Identify the protection needs (i.e., security controls) for the information system(s) and network(s) and document appropriately.

3 1 2

PC12. Research relevant information required to meet the security objectives based on the evaluation of assets, threats, vulnerabilities and security risks.

3 1 2

PC13. Identify and record details of constraints that may have an impact on the business and security options.

3 1 2

PC14. Identify the components of the cyber security infrastructure strategy for the organization Protection; architecture; management; operations; monitoring and testing; incident management; security governance.

4 2 2

PC15. Evaluate the operational strategies of an organization. 3 1 2

PC16. Analyze infrastructure security key performance indicators. 3 1 2

PC17. Maintain the security and confidentiality of information relating to the security objectives.

3 2 1

Page 23: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 20

PC18. Gather sufficient accurate information on which to determine potential costs, benefits and effectiveness of recommended security solutions.

3 1 2

PC19. Determine the cost, potential benefits, and effectiveness of recommended security solutions, based on valid assumptions, considerations.

3 1 2

PC20. Obtain necessary approvals from the responsible persons as per organizational policy.

3 1 2

PC21. Study the existing security policy document that includes the organization’s inventory assessment and network diagrams and maps.

3 1 2

PC22. Develop the purpose and scope of an organisational technical security policy for cyber security infrastructure and obtain necessary approvals.

3 1 2

PC23. Plan system implementation to ensure that all system components can be integrated and aligned (e.g., procedures, databases, policies, software, and hardware).

3 1 2

PC24. Develop an organizational technical security policy providing various guidelines, procedures and regulations regarding cyber security infrastructure.

3 1 2

PC25. Provide input to the Risk Management Framework (RMF) process activities and related documentation (e.g., system lifecycle support plans, concept of operations, operational procedures, and maintenance training materials).

3 2 1

PC26. Translate applicable laws, statutes, and regulatory documents and integrate into policy.

3 1 2

PC27. Specify power supply and heating, ventilation, and air conditioning (HVAC) requirements and configuration based on system performance expectations and design specifications.

3 1 2

PC28. Translate proposed technical solutions into technical specifications.

3 1 2

PC29. Ensure that all cyber security infrastructure is derived out of an architectural plan that is well devised.

4 1 3

Page 24: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 21

PC30. Define and document how the implementation of a new system or new interfaces between systems impacts the security posture of the current environment.

3 1 2

PC31. Obtain approval from key stakeholders on the policy document after discussing the same and incorporating valid suggestions.

3 1 2

PC32. Draft and publish security policy following organizational templates and processes.

3 2 1

Total 100 38 62

4. SSC/N0933

(Monitor and report on the performance of operational and technical cyber security measures)

PC1. Implement automated solutions for monitoring and reporting on the implementation and functioning of cyber security infrastructure components.

5 2 3

PC2. Document the systems and/or components that are not monitored via automated tools.

6 2 4

PC3. Develop a manual process for monitoring and reporting their implementation and performance against policy requirements.

100

6 2 4

PC4. Collect information on the implementation and performance of operational and technical cyber security measures using automated tools or manual processes.

5 2 3

PC5. Assess the configurations against policy and approved baseline configurations using automated tools.

6 2 4

PC6. Facilitate reporting for Security Information and Event Management applications that can be accessed by management and/or formatted into other reports on baseline configuration and performance status.

5 1 4

PC7. Identify uncommon traffic trends and false positives.

6 2 4

PC8. Reconcile changes detected as a result of monitoring activities with approved changes.

5 1 4

PC9. Analyze the results of monitoring activities to determine the reason(s) that an unauthorized change occurred.

6 2 4

PC10. Obtain vulnerabilities identification and analysis from authorized source.

6 2 4

PC11. Obtain risk assessment reports from an authorized source.

6 2 4

Page 25: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 22

PC12. Obtain cyber security audit reports from an authorized source.

6 2 4

PC13. Select specific metrics to measure implementation, efficiency, effectiveness, and the impact of operational and technical cyber security measures.

6 2 4

PC14. Analyze infrastructure security key performance indicators.

5 1 4

PC15. Consolidate findings into reports to support management and compliance.

6 1 5

PC16. Plan for remedial action or countermeasures for areas where inconsistencies have been identified.

5 2 3

PC17. Undertake remedial action for the identified inconsistencies using automated tools.

6 1 5

PC18. Ensure that updates have been made to supporting documents after obtaining due authorizations.

4 1 3

Total 100 30 70

5. SSC/N0927

(Drive interrelated cyber security actions)

PC1. Identify the business functions, and key stakeholders within these, and establish their interest and understanding, relevant to achieving the organization’s aims.

6 2 4

PC2. Recognize the roles, responsibilities, interests, and concerns of the stakeholders in other business functions.

100

6 2 4

PC3. Identify all the activities, functions and operations that are attributed to security or require analysis from security perspective.

4 2 2

PC4. Create an inventory of roles that are responsible, accountable and informed for activities, functions and operations in cyber security.

5 2 3

PC5. Create an inventory of cyber security operations that fall into various key cyber security activities.

8 4 4

PC6. Identify functions that have a joint working relationship with own function.

5 1 4

PC7. Consider the implication of own work on other functions.

6 2 4

PC8. Discuss and consult with stakeholders from other functions in relation to key decisions and activities impacting them.

5 1 4

Page 26: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 23

PC9. Take agreements and track actionable of other functions for interrelated work.

8 3 5

PC10. Follow up with appropriate personnel for meeting timelines and effective functioning.

6 2 4

PC11. Agree on communication and documentation process with stakeholders and maintain the same.

8 3 5

PC12. Identify and sort out conflicts of interest and disagreements with stakeholders, in ways that minimize damage to work and activities, and to the individuals involved and the organization.

6 2 4

PC13. Monitor and review the effectiveness of working relationships with stakeholders in other business functions, seeking and providing feedback, in order to identify areas for improvement.

8 4 4

PC14. Fulfil agreements made with colleagues and stakeholders and let them know, advising them promptly of any difficulties, or where it will be impossible to fulfil agreements.

5 1 4

PC15. Undertake actions agreed with stakeholders in line with the terms of any agreements made.

6 1 5

PC16. Advise stakeholders of difficulties or where it will be impossible to fulfil agreed actions in line with the terms of any agreements made.

8 4 4

Total 100 36 64

6. SSC/N0928

(Manage a project team)

PC1. Ensure the allocation and authorization of work to the project management team is consistent with achieving the project objectives.

20 0 20

PC2. Brief team members on the project and their work allocations.

10 0 10

PC3. Inform team members of changes to work allocations in an appropriate way.

10 10 0

PC4. Provide appropriate support and guidance to team members.

20 0 20

PC5. Monitor and assess the performance of the team against agreed objectives and work plans.

100 10 0 10

PC6. Provide feedback to the team at appropriate times and locations, and in a form and manner most likely to maintain and improve their performance.

10 10 0

Page 27: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 24

PC7. Take effective action to manage any actual or potential conflict between team members.

10 0 10

PC8. Update objectives and work plan regularly, to take account of any individual, team and organizational changes.

10 0 10

Total 100 20 80

7. SSC/N9001

(Manage your work to meet requirements)

PC1. Establish and agree on your work requirements with appropriate people.

100

7 0 7

PC2. Keep your immediate work area clean and tidy.

12 6 6

PC3. Utilize your time effectively. 12 6 6

PC4. Use resources correctly and efficiently. 19 6 13

PC5. Treat confidential information correctly. 7 1 6

PC6. Work in line with your

Organization’s policies and procedures. 12 0 12

PC7. Work within the limits of your job role. 6 0 6

PC8. Obtain guidance from appropriate people, where necessary. 6 0 6

PC9. Ensure your work meets the agreed requirements.

19 6 13

Total 100 25 75

8. SSC/N9002

(Work effectively with colleagues)

PC1. Communicate with colleagues clearly, concisely and accurately.

100

20 0 20

PC2. Work with colleagues to integrate your work effectively with theirs.

10 0 10

PC3. Pass on essential information to colleagues in line with organizational requirements.

10 10 0

PC4. Work in ways that show respect for colleagues.

20 0 20

PC5. Carry out commitments you have made to colleagues. 10 0 10

PC6. Let colleagues know in good time if you cannot carry out your commitments, explaining the reasons.

10 10 0

PC7. Identify any problems you have working with colleagues and take the initiative to solve these problems.

10 0 10

Page 28: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 25

PC8. Follow the organization’s policies and procedures for working with colleagues.

10 0 10

Total 100 20 80

9. SSC/N9003

(Maintain a healthy, safe and secure working environment)

PC1. Comply with your organization’s current health, safety and security policies and procedures.

100

20 10 10

PC2. Report any identified breaches in health, safety, and security policies and procedures to the designated person.

10 0 10

PC3. Identify and correct any hazards that you can deal with safely, competently and within the limits of your authority.

20 10 10

PC4. Report any hazards that you are not competent to deal with to the relevant person in line with organizational procedures and warn other people who may be affected.

10 0 10

PC5. Follow your organization’s emergency procedures promptly, calmly, and efficiently.

20 10 10

PC6. Identify and recommend opportunities for improving health, safety, and security to the designated person.

10 0 10

PC7. Complete any health and safety records legibly and accurately.

10 0 10

Total 100 30 70

10. SSC/N9004

(Provide data/information in standard formats)

PC1. Establish and agree with appropriate people the data/information you need to provide, the formats in which you need to provide it, and when you need to provide it.

100

13 13 0

PC2. Obtain the data/information from reliable sources. 13 0 13

PC3. Check that the data/information is accurate, complete and up-to-date.

12 6 6

PC4. Obtain advice or guidance from appropriate people where there are problems with the data/information.

6 0 6

PC5. Carry out rule-based analysis of the data/information, if required.

25 0 25

PC6. Insert the data/information into the agreed formats.

13 0 13

PC7. Check the accuracy of your work, Involving colleagues where required.

6 0 6

PC8. Report any unresolved anomalies in the data/information to appropriate people.

6 6 0

Page 29: Model Curriculum · Configure cyber security infrastructure components ... VPN, Security Infrastructure Specialist 4 5. Fundamentals of Security Infrastructure Components organization’s

Security Infrastructure Specialist 26

PC9. Provide complete, accurate and

up-to-date data/information to the

appropriate people in the required

formats on time.

6 0 6

Total 100 25 75

11. SSC/N9005

(Develop your knowledge, skills and competence)

PC1. Obtain advice and guidance from appropriate people to develop your knowledge, skills, and competence.

100

10 0 10

PC2. Identify accurately the knowledge and skills you need for your job role. 10 0 10

PC3. Identify accurately your current level of knowledge, skills and competence and any learning and development needs.

20 10 10

PC4. Agree with appropriate people a plan of learning and development activities to address your learning needs.

10 0 10

PC5. Undertake learning and development activities in line with your plan.

20 10 10

PC6. Apply your new knowledge and skills in the workplace, under supervision.

10 0 10

PC7. Obtain feedback from appropriate

people on your knowledge and skills

and how effectively you apply them. 10 0 10

PC8. Review your knowledge, skills,

and competence regularly and take

Appropriate action.

10 0 10

Total 100 20 80

Grand Total 1100 1100